Geographic

Featured Report

Protect Your Network

Help lock down your network to keep intruders out of your computer systems by following these guidelines:

Use a router to secure broadband Internet connections. Always use a router to connect computer systems to broadband Internet connections. Routers come with built-in security features (such as NAT addressing, and firewalls) that hide computer systems from the Internet.

Secure your wireless network. Wireless networks are convenient, but vulnerable if not implemented properly. If you have a wireless network use encryption like WPA2 to secure communications between your computers. Also, change the default administrator password and default network name, called the SSID, on your wireless router. Default passwords and network names for most Internet devices are available across the Internet. This makes them easy targets for intruders. Finally, if you do not need your wireless network at all times, turn it off when not in use. No one can access your network when it is off, which is one of the best security controls available.

Use a Demilitarized Zone (DMZ) for high-risk services. If you must provide web or file sharing services on your network, use a dedicated computer. In addition, use a router that provides a DMZ configuration. This allows connections from the Internet to reach the dedicated computer, while keeping the rest of your network isolated.

Help lock down your network to keep intruders out of your computer systems by following these guidelines:

Use a router to secure broadband Internet connections. Always use a router to connect computer systems to broadband Internet connections. Routers come with built-in security features (such as NAT addressing, and firewalls) that hide computer systems from the Internet. Secure your wireless network. Wireless networks are convenient, but vulnerable if not implemented properly. If you have a wireless network use encryption like WPA2 to secure communications between your computers. Also, change the default administrator password and default network name, called the SSID, on your wireless router. Default passwords and network names for most Internet devices are available across the Internet. This makes them easy targets for intruders. Finally, if you do not need your wireless network at all times, turn it off when not in use. No one can access your network when it is off, which is one of the best security controls available.Use a Demilitarized Zone (DMZ) for high-risk services. If you must provide web or file sharing services on your network, use a dedicated computer....Read More